Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Server 2012 iSCSI target removal

Posted on 2014-08-07
6
Medium Priority
?
540 Views
Last Modified: 2014-08-07
At the moment I have a windows server 2012 running Hyper-V.  On it I have a 600 GB iSCSI target which is connected to another iSCSI target on a replication (DR) server.  

I need to decommision the replication server and move to another server but I am concerned about removing the iSCSI targets on the live server.  

Is it simply a case of removing the target and then adding another one to the new server or will removing the target in some way disrupt the data?

Thanks,
0
Comment
Question by:superjohnbarnes
  • 3
  • 3
6 Comments
 
LVL 60

Expert Comment

by:Cliff Galiher
ID: 40245549
You either are misusing terminology or you have done something that is *very* bad. There is a difference between an initiator and a target, and for windows these almost always be a one to one ratio. Based on your description, that isn't the case, so you are already in a situation where data corruption can occur. But in general, if you keep to a 1:1 connection between initiator and target, you can disconnect and reconnect to a new server without issue. Of course if you disconnect while an application is writing data, the application could fail or data may be inconsistent, but that is a separate issue. You'd usually stop SQL, exchange, etch before disconnecting a target to avoid that issue.
0
 
LVL 1

Author Comment

by:superjohnbarnes
ID: 40245594
Hi Cliff,

You have me worried now!  Although this setup has been running well for over a year with replication of 3 virtual servers to a DR server the possibility of having the virtual disks incorrectly setup has me a little concerned.

Can you explain the 1 to 1 ratio?  Should I be using a target on the main server and just initiator on the DR server with no target or virtual disks?  I need to be able to failover to the DR server.

Thanks,

Peter
0
 
LVL 60

Accepted Solution

by:
Cliff Galiher earned 2000 total points
ID: 40245669
I dont know your network, so I can't say what *you* should do. But at any given time, only one server should be connected to a target. That's 1:1.
0
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

 
LVL 1

Author Comment

by:superjohnbarnes
ID: 40245925
Hi Cliff,

Looking further into this it does indeed look like I have setup correctly with the 1 to 1 relationship.  But the question still remains (happy to open another)  as to which I remove.  This might be a stupid question but I would just like to make sure.  Do i remove the iSCSi virtual disk or the iSCSI target.  I am 90% sure that i will be the target.  Please see the attached.capture
0
 
LVL 60

Expert Comment

by:Cliff Galiher
ID: 40245944
Since your target still shows as connected, I would not remove if. I'd disconnect from the initiator end of the connection first. Then you can retire the target at your leisure.
0
 
LVL 1

Author Comment

by:superjohnbarnes
ID: 40246073
Excellent.  Worked a treat. Thanks again.
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here in this article, you will get a step by step guidance on how to restore an Exchange database to a recovery database. Get a brief on Recovery Database and how it can be used to restore Exchange database in this section!
I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question